version 1.8, 2000/09/15 15:04:17
|
version 1.56, 2011/10/25 18:37:11
|
Line 1
|
Line 1
|
# The LearningOnline Network |
# The LearningOnline Network |
# Cookie Based Access Handler for Construction Area |
# Cookie Based Access Handler for Construction Area |
# (lonacc: 5/21/99,5/22,5/29,5/31 Gerd Kortemeyer) |
# (lonacc: 5/21/99,5/22,5/29,5/31 Gerd Kortemeyer) |
# 6/15,16/11,22/11, |
# |
# 01/06,01/11,6/1 Gerd Kortemeyer |
# $Id$ |
|
# |
|
# Copyright Michigan State University Board of Trustees |
|
# |
|
# This file is part of the LearningOnline Network with CAPA (LON-CAPA). |
|
# |
|
# LON-CAPA is free software; you can redistribute it and/or modify |
|
# it under the terms of the GNU General Public License as published by |
|
# the Free Software Foundation; either version 2 of the License, or |
|
# (at your option) any later version. |
|
# |
|
# LON-CAPA is distributed in the hope that it will be useful, |
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
# GNU General Public License for more details. |
|
# |
|
# You should have received a copy of the GNU General Public License |
|
# along with LON-CAPA; if not, write to the Free Software |
|
# Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
|
# |
|
# /home/httpd/html/adm/gpl.txt |
|
# |
|
# http://www.lon-capa.org/ |
|
# |
|
|
|
=pod |
|
|
|
=head1 NAME |
|
|
|
Apache::lonacc - Cookie Based Access Handler for Construction Area |
|
|
|
=head1 SYNOPSIS |
|
|
|
Invoked (for various locations) by /etc/httpd/conf/loncapa_apache.conf: |
|
|
|
PerlAccessHandler Apache::loncacc |
|
|
|
=head1 INTRODUCTION |
|
|
|
This module enables cookie based authentication for construction area |
|
and is used to control access for three (essentially equivalent) URIs. |
|
|
|
<LocationMatch "^/priv.*"> |
|
<LocationMatch "^/\~.*"> |
|
<LocationMatch "^/\~.*/$"> |
|
|
|
Whenever the client sends the cookie back to the server, |
|
if the cookie is missing or invalid, the user is re-challenged |
|
for login information. |
|
|
|
This is part of the LearningOnline Network with CAPA project |
|
described at http://www.lon-capa.org. |
|
|
|
=head1 HANDLER SUBROUTINE |
|
|
|
This routine is called by Apache and mod_perl. |
|
|
|
=over 4 |
|
|
|
=item * |
|
|
|
load POST parameters |
|
|
|
=item * |
|
|
|
store where they wanted to go (first url entered) |
|
|
|
=back |
|
|
|
=head1 OTHERSUBROUTINES |
|
|
|
=over |
|
|
|
=item constructaccess($url,$setpriv) |
|
|
|
See if the owner domain and name |
|
in the URL match those in the expected environment. If so, return |
|
two element list ($ownername,$ownerdomain). Else, return null string. |
|
If 'setpriv' is set to 'setpriv', it actually assigns the privileges. |
|
=back |
|
|
|
=cut |
|
|
|
|
package Apache::loncacc; |
package Apache::loncacc; |
|
|
use strict; |
use strict; |
use Apache::Constants qw(:common :http :methods); |
use Apache::Constants qw(:common :http :methods REDIRECT); |
use Apache::File; |
use Fcntl qw(:flock); |
use CGI::Cookie(); |
use Apache::lonlocal; |
|
use Apache::lonnet; |
|
use Apache::lonacc; |
|
use LONCAPA qw(:DEFAULT :match); |
|
|
|
sub constructaccess { |
|
my ($url,$setpriv)=@_; |
|
|
|
# We do not allow editing of previous versions of files |
|
if ($url=~/\.(\d+)\.(\w+)$/) { return ''; } |
|
|
|
# Get username and domain from URL |
|
my ($ownerdomain,$ownername)=($url=~/^(?:\/home\/httpd\/html\/|\/)priv\/($match_domain)\/($match_username)\//); |
|
|
|
# The URL does not really point to any authorspace, forget it |
|
unless (($ownername) && ($ownerdomain)) { return ''; } |
|
|
|
# Now we need to see if the user has access to the authorspace of |
|
# $ownername at $ownerdomain |
|
|
|
if (($ownername eq $env{'user.name'}) && ($ownerdomain eq $env{'user.domain'})) { |
|
# Real author for this? |
|
if (exists($env{'user.priv.au./'.$ownerdomain.'/./'})) { |
|
return ($ownername,$ownerdomain); |
|
} |
|
} else { |
|
# Co-author for this? |
|
if (exists($env{'user.priv.ca./'.$ownerdomain.'/'.$ownername.'./'}) || |
|
exists($env{'user.priv.aa./'.$ownerdomain.'/'.$ownername.'./'}) ) { |
|
return ($ownername,$ownerdomain); |
|
} |
|
} |
|
# We don't have any access right now. If we are not possibly going to do anything about this, |
|
# we might as well leave |
|
unless ($setpriv) { return ''; } |
|
|
|
# Backdoor access? |
|
my $allowed=&Apache::lonnet::allowed('eco',$ownerdomain); |
|
# Nope |
|
unless ($allowed) { return ''; } |
|
# Looks like we may have access, but could be locked by the owner of the construction space |
|
if ($allowed eq 'U') { |
|
my %blocked=&Apache::lonnet::get('environment',['domcoord.author'], |
|
$ownerdomain,$ownername); |
|
# Is blocked by owner |
|
if ($blocked{'domcoord.author'} eq 'blocked') { return ''; } |
|
} |
|
if (($allowed eq 'F') || ($allowed eq 'U')) { |
|
# Grant temporary access |
|
my $then=$env{'user.login.time'}; |
|
my $update==$env{'user.update.time'}; |
|
if (!$update) { $update = $then; } |
|
my $refresh=$env{'user.refresh.time'}; |
|
if (!$refresh) { $refresh = $update; } |
|
my $now = time; |
|
&Apache::lonnet::check_adhoc_privs($ownerdomain,$ownername, |
|
$update,$refresh,$now,'ca', |
|
'constructaccess'); |
|
return($ownername,$ownerdomain); |
|
} |
|
# No business here |
|
return ''; |
|
} |
|
|
sub handler { |
sub handler { |
my $r = shift; |
my $r = shift; |
my $requrl=$r->uri; |
my $requrl=$r->uri; |
my %cookies=CGI::Cookie->parse($r->header_in('Cookie')); |
$env{'request.editurl'}=$requrl; |
my $lonid=$cookies{'lonID'}; |
|
my $cookie; |
my $handle = &Apache::lonnet::check_for_valid_session($r); |
if ($lonid) { |
if ($handle ne '') { |
my $handle=$lonid->value; |
|
$handle=~s/\W//g; |
# ------------------------------------------------------ Initialize Environment |
my $lonidsdir=$r->dir_config('lonIDsDir'); |
my $lonidsdir=$r->dir_config('lonIDsDir'); |
if ((-e "$lonidsdir/$handle.id") && ($handle ne '')) { |
&Apache::lonnet::transfer_profile_to_env($lonidsdir,$handle); |
my $ownername=$requrl; |
|
$ownername=~s/\/\~(\w+).*/\1/; |
# --------------------------------------------------------- Initialize Language |
my $ownerdomain=$r->dir_config('lonDefDomain'); |
|
my @handleparts=split(/\_/,$handle); |
&Apache::lonlocal::get_language_handle($r); |
my $username=$handleparts[0]; |
|
my $domain=$handleparts[2]; |
# -------------------------------------------------------------- Resource State |
if (($username ne $ownername) || ($domain ne $ownerdomain)) { |
|
$r->log_reason |
$env{'request.state'} = "construct"; |
("$username at $domain not authorized", $r->filename); |
$env{'request.filename'} = $r->filename; |
return HTTP_NOT_ACCEPTABLE; |
|
} |
unless (&constructaccess($requrl,'setpriv')) { |
my @profile; |
$r->log_reason("Unauthorized $requrl", $r->filename); |
{ |
return HTTP_NOT_ACCEPTABLE; |
my $idf=Apache::File->new("$lonidsdir/$handle.id"); |
} |
@profile=<$idf>; |
|
} |
# -------------------------------------------------------- Load POST parameters |
my $envi; |
|
for ($envi=0;$envi<=$#profile;$envi++) { |
&Apache::lonacc::get_posted_cgi($r); |
chomp($profile[$envi]); |
|
my ($envname,$envvalue)=split(/=/,$profile[$envi]); |
return OK; |
$r->subprocess_env("$envname" => "$envvalue"); |
} else { |
} |
$r->log_reason("Cookie $handle not valid", $r->filename) |
$r->subprocess_env("user.environment" => "$lonidsdir/$handle.id", |
|
"request.state" => "construct", |
|
"request.filename" => $r->filename); |
|
my $buffer; |
|
|
|
$r->read($buffer,$r->header_in('Content-length')); |
|
my @pairs=split(/&/,$buffer); |
|
my $pair; my $name; my $value; |
|
foreach $pair (@pairs) { |
|
($name,$value) = split(/=/,$pair); |
|
$value =~ tr/+/ /; |
|
$value =~ s/%([a-fA-F0-9][a-fA-F0-9])/pack("C",hex($1))/eg; |
|
$r->subprocess_env("form.$name" => $value); |
|
} |
|
|
|
$r->method_number(M_GET); |
|
$r->method('GET'); |
|
$r->headers_in->unset('Content-length'); |
|
|
|
return OK; |
|
} else { |
|
$r->log_reason("Cookie $handle not valid", $r->filename) |
|
}; |
|
} |
} |
|
|
# ----------------------------------------------- Store where they wanted to go |
# ----------------------------------------------- Store where they wanted to go |
|
|
$ENV{'request.firsturl'}=$requrl; |
$env{'request.firsturl'}=$requrl; |
return FORBIDDEN; |
return FORBIDDEN; |
} |
} |
|
|